Results 41 to 50 of about 13,790 (272)

Transparent CoAP Services to IoT Endpoints through ICN Operator Networks

open access: yesSensors, 2019
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices.
Hasan Mahmood Aminul Islam   +4 more
doaj   +1 more source

Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

open access: yesComputer systems science and engineering, 2022
Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing
S. G. Oliver, T. Purusothaman
semanticscholar   +1 more source

A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Internet Engineering Task Force (IETF) have developed Constrained Application Protocol (CoAP) to enable communication between sensor or actuator nodes in constrained environments, such as small amount of memory, and low power. IETF CoAP and HTTP are used
Wenquan Jin, DoHyeun Kim
doaj   +1 more source

CoAP Protocol for Constrained Networks [PDF]

open access: yesInternational Journal of Wireless and Microwave Technologies, 2015
This paper discusses the Constrained Application Protocol (CoAP), an application layer protocol introduced by Internet Engineering Task Force (IETF) Constrained RESTful environment (CoRE) Working Group for use with low power and resource constrained nodes in the internet of things.
Manveer Joshi, Bikram Pal Kaur
openaire   +1 more source

TCP in the Internet of Things: from ostracism to prominence [PDF]

open access: yes, 2018
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Arcia Moret, Andrés   +2 more
core   +1 more source

Leveraging upon standards to build the Internet of things [PDF]

open access: yes, 2012
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols ...
Carels, David   +7 more
core   +3 more sources

Security of IoT Application Layer Protocols: Challenges and Findings

open access: yesFuture Internet, 2020
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly
Giuseppe Nebbione   +1 more
doaj   +1 more source

Securing Name Resolution in the IoT: DNS over CoAP [PDF]

open access: yesStudentWorkshop@CoNEXT, 2021
In this paper, we present the design, implementation, and analysis of DNS over CoAP~(DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices.
Martine S. Lenders   +5 more
semanticscholar   +1 more source

Bindings and RESTlets: a novel set of CoAP-based application enablers to build IoT applications [PDF]

open access: yes, 2016
Sensors and actuators are becoming important components of Internet of Things (IoT) applications. Today, several approaches exist to facilitate communication of sensors and actuators in IoT applications.
Demeester, Piet   +4 more
core   +2 more sources

Performance Evaluation of CoAP and MQTT_SN in an IoT Environment

open access: yesProceedings, 2019
The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things.
Mónica Martí   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy